A Multidimensional Trust Evaluation Mechanism for Improving Network Security in Fog Computing

被引:0
|
作者
Liu, Xiao [1 ]
Tan, Zhencai [1 ]
Liang, Li [1 ]
Li, Gaoxiang [2 ]
机构
[1] Guangxi Univ, Guangxi Coll & Univ Key Lab Multimedia Commun & In, Sch Comp Elect & Informat, Guangxi Key Lab Multimedia Commun & Network Techno, Nanning 530004, Peoples R China
[2] Guangxi Univ, Sch Elect Engn, Guangxi Key Lab Power Syst Optimizat & Energy Tech, Nanning 530004, Peoples R China
基金
中国国家自然科学基金;
关键词
Fog computing; multidimensional trust; trust evaluation; weight algorithm;
D O I
10.1109/TII.2024.3449997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nodes in fog computing are easily captured since they are generally resource-constraint and usually work in open and unprotected environments. In this article, a multidimensional trust fusion preference (MTFP) strategy is proposed to detect the malicious node, which mines and utilizes multiple factors that affect trust evaluation. First, the service rating gaps between the self-evaluation and other evaluation in a historical sliding window are calculated and differentially used to alleviate the behavior sparse problem of direct trust evaluation. In addition, a multiperspective weight algorithm is designed to improve the rationality of recommendation trust. Moreover, a reward and punishment factor are designed and incorporated into global trust calculation to enhance the reliability of trust evaluation. Compared with the existing mechanism model method of trust evaluation, the proposed MTFP strategy uses more node information, which can improve the detection precision and recall of malicious nodes at the same time. Finally, the experimental results validate the effectiveness of the proposed trust evaluation method.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Fog computing security: a review of current applications and security solutions
    Khan, Saad
    Parkinson, Simon
    Qin, Yongrui
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6
  • [42] Fog computing security: a review of current applications and security solutions
    Saad Khan
    Simon Parkinson
    Yongrui Qin
    [J]. Journal of Cloud Computing, 6
  • [43] A dynamic trust evaluation mechanism based on affective intensity computing
    Zhou, Guoqiang
    Wang, Kuang
    Zhao, Chen
    Zhou, Guofu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3752 - 3761
  • [44] A neutrosophic AHP-based computational technique for security management in a fog computing network
    Jasleen Kaur
    Rajeev Kumar
    Alka Agrawal
    Raees Ahmad Khan
    [J]. The Journal of Supercomputing, 2023, 79 : 295 - 320
  • [45] A neutrosophic AHP-based computational technique for security management in a fog computing network
    Kaur, Jasleen
    Kumar, Rajeev
    Agrawal, Alka
    Khan, Raees Ahmad
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (01): : 295 - 320
  • [46] The Fog Computing Paradigm: Scenarios and Security Issues
    Stojmenovic, Ivan
    Wen, Sheng
    [J]. FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 1 - 8
  • [47] Mutual Authentication Security Scheme in Fog Computing
    Rahman, Gohar
    Wen, Chuah Chai
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 443 - 451
  • [48] An Overview on the Applications and Security Issues of Fog Computing
    Bi, Fangming
    Miao, Xuzhi
    Chen, Wei
    Fang, Weidong
    Zhang, Wuxiong
    Wang, Deyu
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1792 - 1797
  • [49] Fog Computing: Issues and Challenges in Security and Forensics
    Wang, Yifan
    Uehara, Tetsutaro
    Sasaki, Ryoichi
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 53 - 59
  • [50] An overview of Fog computing and its security issues
    Stojmenovic, Ivan
    Wen, Sheng
    Huang, Xinyi
    Luan, Hao
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2991 - 3005